PT-2025-7547 · Xwiki · Xwiki Platform
John Kwak
·
Published
2024-05-06
·
Updated
2026-02-05
·
CVE-2025-24893
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
XWiki versions prior to 15.10.11
XWiki versions prior to 16.4.1
XWiki versions prior to 16.5.0RC1
Description
XWiki Platform is susceptible to a remote code execution (RCE) vulnerability. An unauthenticated attacker can execute arbitrary code by sending a specially crafted request to the
SolrSearch endpoint. The vulnerability stems from improper handling of user-supplied input within the SolrSearchMacros component, specifically failing to sanitize RSS feed input. This allows the injection and execution of Groovy code. The RondoDox botnet has been observed actively exploiting this vulnerability to deploy cryptocurrency miners and establish remote shells. Numerous reports indicate widespread exploitation, with over 1,200 exposed instances identified.API Endpoint:
/xwiki/bin/get/Main/SolrSearch
Vulnerable Parameter: textRecommendations
XWiki versions prior to 15.10.11: Upgrade to version 15.10.11 or later.
XWiki versions prior to 16.4.1: Upgrade to version 16.4.1 or later.
XWiki versions prior to 16.5.0RC1: Upgrade to version 16.5.0RC1 or later.
As a workaround, edit
Main.SolrSearchMacros in SolrSearchMacros.xml on line 955 to match the rawResponse macro in macros.vm#L2824 with a content type of application/xml.Exploit
Fix
LPE
RCE
Code Injection
Eval Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
BDU:2025-01880
CVE-2025-24893
GHSA-RR6P-3PFG-562J
Affected Products
Xwiki Platform
References · 109
- 🔥 https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/24xxx/CVE-2025-24893.json⭐ 2355 🔗 534 · Exploit
- 🔥 https://github.com/gunzf0x/CVE-2025-24893⭐ 20 🔗 3 · Exploit
- https://github.com/xwiki/xwiki-platform/commit/67021db9b8ed26c2236a653269302a86bf01ef40⭐ 1148 🔗 603 · Patch
- https://nvd.nist.gov/vuln/detail/CVE-2025-24893 · Security Note
- https://bdu.fstec.ru/vul/2025-01880 · Security Note
- https://jira.xwiki.org/browse/XWIKI-22149 · Vendor Advisory
- https://osv.dev/vulnerability/GHSA-rr6p-3pfg-562j · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2025-24893 · Vendor Advisory
- https://github.com/xwiki/xwiki-platform⭐ 1200 🔗 614 · Note
- https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-rr6p-3pfg-562j⭐ 1190 🔗 614 · Security Note, Vendor Advisory
- https://github.com/xwiki/xwiki-platform/blob/67021db9b8ed26c2236a653269302a86bf01ef40/xwiki-platform-core/xwiki-platform-web/xwiki-platform-web-templates/src/main/resources/templates/macros.vm#L2824⭐ 1148 🔗 603 · Note
- https://github.com/xwiki/xwiki-platform/blob/568447cad5172d97d6bbcfda9f6183689c2cf086/xwiki-platform-core/xwiki-platform-search/xwiki-platform-search-solr/xwiki-platform-search-solr-ui/src/main/resources/Main/SolrSearchMacros.xml#L955⭐ 1148 🔗 603 · Note
- https://twitter.com/mveracf/status/2019357925236462069 · Twitter Post
- https://twitter.com/ptdbugs/status/1963941256700031177 · Twitter Post
- https://twitter.com/lowcountrycyber/status/1990499279031435419 · Twitter Post